Skip to content

Commit 448133c

Browse files
authored
Merge pull request #251267 from SnehaSudhirG/13June-AUMFastFollow1
Removed preview for Dynamic scope and customer managed schedules
2 parents 49f473c + f6332a2 commit 448133c

10 files changed

+31
-34
lines changed

articles/update-center/dynamic-scope-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For Dynamic Scoping and configuration assignment, ensure that you have the follo
4141

4242
## Service limits
4343

44-
The following are the Dynamic scope (preview) limits for **each dynamic scope**.
44+
The following are the Dynamic scope limits for **each dynamic scope**.
4545

4646
| Resource | Limit |
4747
|----------|----------------------------|
@@ -50,7 +50,7 @@ The following are the Dynamic scope (preview) limits for **each dynamic scope**.
5050
| Number of Resource Group filters | 50 |
5151

5252
> [!NOTE]
53-
> The above limits are for Dynamic scope (preview) in the Guest scope only.
53+
> The above limits are for Dynamic scope in the Guest scope only.
5454
5555
## Next steps
5656

articles/update-center/guidance-migration-automation-update-management-azure-update-manager.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ Guidance to move various capabilities is provided in table below:
3333
1 | Patch management for Off-Azure machines. | Could run with or without Arc connectivity. | Azure Arc is a prerequisite for non-Azure machines. | 1. [Create service principal](../app-service/quickstart-php.md#1---get-the-sample-repository) </br> 2. [Generate installation script](../azure-arc/servers/onboard-service-principal.md#generate-the-installation-script-from-the-azure-portal) </br> 3. [Install agent and connect to Azure](../azure-arc/servers/onboard-service-principal.md#install-the-agent-and-connect-to-azure) | 1. [Create service principal](../azure-arc/servers/onboard-service-principal.md#azure-powershell) <br> 2. [Generate installation script](../azure-arc/servers/onboard-service-principal.md#generate-the-installation-script-from-the-azure-portal) </br> 3. [Install agent and connect to Azure](../azure-arc/servers/onboard-service-principal.md#install-the-agent-and-connect-to-azure) |
3434
2 | Enable periodic assessment to check for latest updates automatically every few hours. | Machines automatically receive the latest updates every 12 hours for Windows and every 3 hours for Linux. | Periodic assessment is an update setting on your machine. If it's turned on, the Update Manager fetches updates every 24 hours for the machine and shows the latest update status. | 1. [Single machine](manage-update-settings.md#configure-settings-on-a-single-vm) </br> 2. [At scale](manage-update-settings.md#configure-settings-at-scale) </br> 3. [At scale using policy](periodic-assessment-at-scale.md) | 1. [For Azure VM](../virtual-machines/automatic-vm-guest-patching.md#azure-powershell-when-updating-a-windows-vm) </br> 2.[For Arc-enabled VM](/powershell/module/az.connectedmachine/update-azconnectedmachine?view=azps-10.2.0) |
3535
3 | Static Update deployment schedules (Static list of machines for update deployment). | Automation Update management had its own schedules. | Azure Update Manager creates a [maintenance configuration](../virtual-machines/maintenance-configurations.md) object for a schedule. So, you need to create this object, copying all schedule settings from Automation Update Management to Azure Update Manager schedule. | 1. [Single VM](scheduled-patching.md#schedule-recurring-updates-on-single-vm) </br> 2. [At scale](scheduled-patching.md#schedule-recurring-updates-at-scale) </br> 3. [At scale using policy](scheduled-patching.md#onboarding-to-schedule-using-policy) | [Create a static scope](manage-vms-programmatically.md) |
36-
4 | Dynamic Update deployment schedules (Defining scope of machines using resource group, tags, etc. which is evaluated dynamically at runtime).| Same as static update schedules. | Same as static update schedules. | [Add a dynamic scope](manage-dynamic-scoping.md#add-a-dynamic-scope-preview) | [Create a dynamic scope]( tutorial-dynamic-grouping-for-scheduled-patching.md#create-a-dynamic-scope) |
36+
4 | Dynamic Update deployment schedules (Defining scope of machines using resource group, tags, etc. which is evaluated dynamically at runtime).| Same as static update schedules. | Same as static update schedules. | [Add a dynamic scope](manage-dynamic-scoping.md#add-a-dynamic-scope | [Create a dynamic scope]( tutorial-dynamic-grouping-for-scheduled-patching.md#create-a-dynamic-scope) |
3737
5 | Deboard from Azure Automation Update management. | After you complete the steps 1, 2, and 3, you need to clean up Azure Update management objects. | | 1. [Remove machines from solution](../automation/update-management/remove-feature.md#remove-management-of-vms) </br> 2. [Remove Update Management solution](../automation/update-management/remove-feature.md#remove-updatemanagement-solution) </br> 3. [Unlink workspace from Automation account](../automation/update-management/remove-feature.md#unlink-workspace-from-automation-account) </br> 4. [Cleanup Automation account](../automation/update-management/remove-feature.md#cleanup-automation-account) | NA |
3838
6 | Reporting | Custom update reports using Log Analytics queries. | Update data is stored in Azure Resource Graph (ARG). Customers can query ARG data to build custom dashboards, workbooks etc. | The old Automation Update Management data stored in Log analytics can be accessed, but there's no provision to move data to ARG. You can write ARG queries to access data that will be stored to ARG after virtual machines are patched via Azure Update Manager. With ARG queries you can, build dashboards and workbooks using following instructions: </br> 1. [Log structure of Azure Resource graph updates data](query-logs.md) </br> 2. [Sample ARG queries](sample-query-logs.md) </br> 3. [Create workbooks](manage-workbooks.md) | NA |
3939
7 | Customize workflows using pre and post scripts. | Available as Automation runbooks. | We recommend that you use Automation runbooks once they are available. | | |
40-
8 | Create alerts based on updates data for your environment | Alerts can be set up on updates data stored in Log Analytics. |We recommend that you use alerts once thy are available. | | |
40+
8 | Create alerts based on updates data for your environment | Alerts can be set up on updates data stored in Log Analytics. |We recommend that you use alerts once they are available. | | |
4141

4242

4343

articles/update-center/includes/dynamic-scope-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Register-AzProviderFeature -ProviderNamespace Microsoft.Maintenance -FeatureName
2929

3030
#### [Azure VMs](#tab/avms)
3131

32-
- Patch Orchestration must be set to Customer Managed Schedules (Preview). This sets patch mode to AutomaticByPlatform and the **BypassPlatformSafetyChecksOnUserSchedule** = *True*.
32+
- Patch Orchestration must be set to Customer Managed Schedules. This sets patch mode to AutomaticByPlatform and the **BypassPlatformSafetyChecksOnUserSchedule** = *True*.
3333
- Associate a Schedule with the VM.
3434

3535
#### [Arc-enabled VMs](#tab/arcvms)

articles/update-center/index.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,6 @@ landingContent:
7575
links:
7676
- text: Check and install on-demand updates
7777
url: quickstart-on-demand.md
78-
7978
- title: Dynamic Scoping
8079
linkLists:
8180
- linkListType: concept
@@ -84,9 +83,9 @@ landingContent:
8483
url: dynamic-scope-overview.md
8584
- linkListType: tutorial
8685
links:
87-
- text: Schedule updates on Dynamic scopes (preview)
86+
- text: Schedule updates on Dynamic scopes
8887
url: tutorial-dynamic-grouping-for-scheduled-patching.md
8988
- linkListType: how-to-guide
9089
links:
91-
- text: Manage dynamic scope (preview) operations
90+
- text: Manage dynamic scope operations
9291
url: manage-dynamic-scoping.md

articles/update-center/manage-dynamic-scoping.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@ ms.topic: how-to
1212

1313
**Applies to:** :heavy_check_mark: Windows VMs :heavy_check_mark: Linux VMs :heavy_check_mark: On-premises environment :heavy_check_mark: Azure Arc-enabled servers.
1414

15-
This article describes how to view, add, edit and delete a dynamic scope (preview).
15+
This article describes how to view, add, edit and delete a dynamic scope.
1616

1717
[!INCLUDE [dynamic-scope-prerequisites.md](includes/dynamic-scope-prerequisites.md)]
1818

19-
## Add a Dynamic scope (preview)
19+
## Add a Dynamic scope
2020
To add a Dynamic scope to an existing configuration, follow these steps:
2121

2222
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Update Manager**.
@@ -29,27 +29,26 @@ To add a Dynamic scope to an existing configuration, follow these steps:
2929
> [!NOTE]
3030
> The list of machines may be different at run time.
3131
1. In the **Configure Azure VMs for schedule updates** page, select any one of the following options to provide your consent:
32-
1. **Change the required options to ensure schedule supportability** - this option confirms that you want to update the patch orchestration from existing option to *Customer Managed Schedules (Preview)*: This updates the following two properties on your behalf:
32+
1. **Change the required options to ensure schedule supportability** - this option confirms that you want to update the patch orchestration from existing option to *Customer Managed Schedules*: This updates the following two properties on your behalf:
3333

3434
- *Patch mode = AutomaticByPlatform*
3535
- *Set the BypassPlatformSafetyChecksOnUserSchedule = True*.
36-
1. **Continue with supported machines only** - this option confirms that you want to proceed with only the machines that already have patch orchestration set to *Customer Managed Schedules (Preview)*.
36+
1. **Continue with supported machines only** - this option confirms that you want to proceed with only the machines that already have patch orchestration set to *Customer Managed Schedules*.
3737

3838
> [!NOTE]
39-
> In the **Preview of machines based on above scope** page, you can view only the machines that don't have patch orchestration set to *Customer Managed Schedules (Preview)*.
39+
> In the **Preview of machines based on above scope** page, you can view only the machines that don't have patch orchestration set to *Customer Managed Schedules*.
4040
4141
1. Select **Save** to go back to the Dynamic scopes tab. In this tab, you can view and edit the Dynamic scope that you have created.
4242

43-
## View Dynamic scope (preview)
44-
45-
To view the list of Dynamic scopes (preview) associated to a given maintenance configuration, follow these steps:
43+
## View Dynamic scope
44+
To view the list of Dynamic scopes associated to a given maintenance configuration, follow these steps:
4645

4746
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Update Manager**.
4847
1. Select **Machines** > **Browse maintenance configurations** > **Maintenance configurations**.
4948
1. In the **Maintenance configurations** page, select the name of the maintenance configuration for which you want to view the Dynamic scope.
5049
1. In the given maintenance configuration page, select **Dynamic scopes** to view all the Dynamic scopes that are associated with the maintenance configuration.
5150

52-
## Edit a Dynamic scope (preview)
51+
## Edit a Dynamic scope
5352

5453
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Update Manager**.
5554
1. Select **Machines** > **Browse maintenance configurations** > **Maintenance configurations**.
@@ -60,14 +59,14 @@ To view the list of Dynamic scopes (preview) associated to a given maintenance c
6059
> Subscription is mandatory for the creation of dynamic scope and you can't edit it after the dynamic scope is created.
6160
1. Select **Save**.
6261

63-
## Delete a Dynamic scope (preview)
62+
## Delete a Dynamic scope
6463

6564
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Update Manager**.
6665
1. Select **Machines** > **Browse maintenance configurations** > **Maintenance configurations**.
6766
1. In the **Maintenance configurations** page, select the name of the maintenance configuration for which you want to edit an existing Dynamic scope.
6867
1. In the given maintenance configuration page > select **Dynamic scopes** and select the scope you want to delete. Select **Remove dynamic scope** and then select **Ok**.
6968

70-
## View patch history of a Dynamic scope (preview)
69+
## View patch history of a Dynamic scope
7170

7271
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Update Manager**.
7372
1. Select **History** > **Browse maintenance configurations** > **Maintenance configurations** to view the patch history of a dynamic scope.
@@ -94,7 +93,7 @@ Obtaining consent to apply updates is an important step in the workflow of dynam
9493

9594
#### [From Schedule updates tab](#tab/sc)
9695

97-
1. Follow the steps from 1 to 5 listed in [Add a Dynamic scope (preview)](#add-a-dynamic-scope-preview).
96+
1. Follow the steps from 1 to 5 listed in [Add a Dynamic scope](#add-a-dynamic-scope).
9897
1. In **Machines** tab, select **Add machine**, In **Select resources** page, select the machines and select **Add**
9998
1. In **Configure Azure VMs for schedule updates**, select **Continue to schedule updates** option to confirm that:
10099

articles/update-center/scheduled-patching.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,17 @@ ms.author: sudhirsneha
1313
**Applies to:** :heavy_check_mark: Windows VMs :heavy_check_mark: Linux VMs :heavy_check_mark: On-premises environment :heavy_check_mark: Azure Arc-enabled servers.
1414

1515
> [!IMPORTANT]
16-
> - For a seamless scheduled patching experience, we recommend that for all Azure VMs, you update the patch orchestration to **Customer Managed Schedules (Preview)** by **30th June 2023**. If you fail to update the patch orchestration by **30th June 2023**, you can experience a disruption in business continuity because the schedules will fail to patch the VMs.[Learn more](prerequsite-for-schedule-patching.md).
17-
16+
> - For a seamless scheduled patching experience, we recommend that for all Azure VMs, you update the patch orchestration to **Customer Managed Schedules** by **30th June 2023**. If you fail to update the patch orchestration by **30th June 2023**, you can experience a disruption in business continuity because the schedules will fail to patch the VMs.[Learn more](prerequsite-for-schedule-patching.md).
1817
1918
You can use Update Manager in Azure to create and save recurring deployment schedules. You can create a schedule on a daily, weekly or hourly cadence, specify the machines that must be updated as part of the schedule, and the updates to be installed. This schedule will then automatically install the updates as per the created schedule for single VM and at scale.
2019

2120
Update Manager uses maintenance control schedule instead of creating its own schedules. Maintenance control enables customers to manage platform updates. For more information, see [Maintenance control documentation](/azure/virtual-machines/maintenance-control).
2221

2322
## Prerequisites for scheduled patching
2423

25-
1. See [Prerequisites for Azure Update Manager](./overview.md#prerequisites)
26-
1. Patch orchestration of the Azure machines should be set to **Customer Managed Schedules (Preview)**. For more information, see [how to enable schedule patching on existing VMs](prerequsite-for-schedule-patching.md#enable-schedule-patching-on-azure-vms). For Azure Arc-enabled machines, it isn't a requirement.
2724

25+
1. See [Prerequisites for Update Manager](./overview.md#prerequisites)
26+
1. Patch orchestration of the Azure machines should be set to **Customer Managed Schedules**. For more information, see [how to enable schedule patching on existing VMs](prerequsite-for-schedule-patching.md#enable-schedule-patching-on-azure-vms). For Azure Arc-enabled machines, it isn't a requirement.
2827
> [!Note]
2928
> If you set the patch mode to Azure orchestrated (AutomaticByPlatform) but do not enable the **BypassPlatformSafetyChecksOnUserSchedule** flag and do not attach a maintenance configuration to an Azure machine, it is treated as [Automatic Guest patching](../virtual-machines/automatic-vm-guest-patching.md) enabled machine and Azure platform will automatically install updates as per its own schedule. [Learn more](./overview.md#prerequisites).
3029

@@ -237,7 +236,7 @@ You can create a new Guest OS update maintenance configuration or modify an exis
237236
The Azure update Manager allows you to target a group of Azure or non-Azure VMs for update deployment via Azure Policy. The grouping using policy, keeps you from having to edit your deployment to update machines. You can use subscription, resource group, tags or regions to define the scope and use this feature for the built-in policies which you can customize as per your use-case.
238237

239238
> [!NOTE]
240-
> This policy also ensures that the patch orchestration property for Azure machines is set to **Customer Managed Schedules (Preview)** as it is a prerequisite for scheduled patching.
239+
> This policy also ensures that the patch orchestration property for Azure machines is set to **Customer Managed Schedules** as it is a prerequisite for scheduled patching.
241240
242241

243242
### Assign a policy

articles/update-center/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
href: prerequsite-for-schedule-patching.md
3131
- name: Assessment options
3232
href: assessment-options.md
33-
- name: Dynamic scope (preview)
33+
- name: Dynamic scope
3434
href: dynamic-scope-overview.md
3535
- name: Query resources with Azure Resource Graph
3636
href: query-logs.md
@@ -62,7 +62,7 @@
6262
href: deploy-updates.md
6363
- name: Schedule updates
6464
href: scheduled-patching.md
65-
- name: Manage dynamic scope (preview)
65+
- name: Manage dynamic scope
6666
href: manage-dynamic-scoping.md
6767
- name: Manage update settings
6868
href: manage-update-settings.md

articles/update-center/tutorial-dynamic-grouping-for-scheduled-patching.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Schedule updates on Dynamic Scoping.
2+
title: Schedule updates on Dynamic scoping.
33
description: In this tutorial, you learn how to group machines, dynamically apply the updates at scale.
44
ms.service: azure-update-manager
55
ms.date: 09/18/2023
@@ -9,7 +9,7 @@ ms.author: sudhirsneha
99
#Customer intent: As an IT admin, I want dynamically apply patches on the machines as per a schedule.
1010
---
1111

12-
# Tutorial: Schedule updates on Dynamic scopes (preview)
12+
# Tutorial: Schedule updates on Dynamic scopes
1313

1414
**Applies to:** :heavy_check_mark: Windows VMs :heavy_check_mark: Linux VMs :heavy_check_mark: On-premises environment :heavy_check_mark: Azure VMs :heavy_check_mark: Azure Arc-enabled servers.
1515

@@ -35,7 +35,7 @@ To create a dynamic scope, follow these steps:
3535
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Update Manager**.
3636
1. Select **Overview** > **Schedule updates** > **Create a maintenance configuration**.
3737
1. In the **Create a maintenance configuration** page, enter the details in the **Basics** tab and select **Maintenance scope** as *Guest* (Azure VM, Arc-enabled VMs/servers).
38-
1. Select **Dynamic Scopes** and follow the steps to [Add Dynamic scope](manage-dynamic-scoping.md#add-a-dynamic-scope-preview).
38+
1. Select **Dynamic Scopes** and follow the steps to [Add Dynamic scope](manage-dynamic-scoping.md#add-a-dynamic-scope).
3939
1. In **Machines** tab, select **Add machines** to add any individual machines to the maintenance configuration and select **Updates**.
4040
1. In the **Updates** tab, select the patch classification that you want to include/exclude and select **Tags**.
4141
1. Provide the tags in **Tags** tab.

0 commit comments

Comments
 (0)